|
|
Information Systems Security
by Venkatakrishnan, Venkat.
Publication:
. XVI, 353 p. 96 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multiple Access Communications
by Bellalta, Boris.
Publication:
. XII, 183 p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – ASIACRYPT 2012
by Wang, Xiaoyun.
Publication:
. XVI, 780 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology - INDOCRYPT 2012
by Galbraith, Steven.
Publication:
. XIV, 566 p. 118 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Outreach of Digital Libraries: A Globalized Resource Network
by Chen, Hsin-Hsi.
Publication:
. XXII, 372 p. 129 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Testing Software and Systems
by Nielsen, Brian.
Publication:
. X, 263 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Knowledge Engineering
by Xiang, Yang.
Publication:
. XII, 251 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Blyth, Jim.
Publication:
. X, 141 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations of Intelligent Systems
by Chen, Li.
Publication:
. XX, 468 p. 152 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Xu, Li.
Publication:
. XIV, 532 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Artificial Intelligence - SBIA 2012
by Barros, Leliane N.
Publication:
. XVI, 233 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security, Privacy, and Applied Cryptography Engineering
by Bogdanov, Andrey.
Publication:
. XII, 173 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Liu, Chengfei.
Publication:
. XX, 795 p. 258 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Grossklags, Jens.
Publication:
. XII, 309 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provenance and Annotation of Data and Processes
by Groth, Paul.
Publication:
. XII, 256 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Large-Scale Data- and Knowledge-Centered Systems VI
by Hameurlain, Abdelkader.
Publication:
. XII, 259 p. 113 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structural, Syntactic, and Statistical Pattern Recognition
by Gimel’farb, Georgy.
Publication:
. XVIII, 755 p. 236 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Intelligent Data Analysis XI
by Hollmén, Jaakko.
Publication:
. XIV, 426 p. 136 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Information and Computer Security
by Hanaoka, Goichiro.
Publication:
. XII, 261 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|